On 7/9/08 10:31 AM, Dan Wing wrote:
Yikes. That's not a circus -- that's a abattoir. It's a very careful
analysis of why carriers want all of SIP except for the SIP part.
It looks like it boils down to:
4.1.1(a) - Some SIP products are broken by either design or
implementation
4.1.1(b) - Inter-service provider federation is being rolled out
without any of the tools the IETF has defined for that
kind of thing
4.2 - Service providers won't deploy DNS, despite it
being integral
to SIP and the Internet at large
4.3 - (Mostly a symptom of 4.2) People are deploying security
theater without any of the tools the IETF has defined for
that kind
of thing, and tel: URLs aren't apparently supported, even
when E.164
is the only useful identifier in use. (If you can change
the domain
of a URI and still have it mean anything at all, it
should have been
a tel: URL anyway)
4.4 - This isn't a stand-alone issue; it's a symptom of 4.1.1(b)
In short -- if we ignore the software bugs, it looks like the
problems all boil down the service providers choosing to ignore
various IETF-defined solutions (mostly as they relate to security).
By IETF-defined security solutions, are you referring to Speermint,
which is all about SBE and DBEs?
No; I mean solutions like mutual TLS for domain authentication. Or even
IPSec gateways, like 3GPP has defined. There are secure ways to do what
service providers want to do. But, for some reason, the idea that you
can secure networks by whitelisting based on unverified "From" header
fields has gained mindshare. For some reason, people are still
authenticating based on source IP address (!!!) instead of using any of
a myriad of certificate-based techniques. I mean solutions like RFC 3263
for machine location instead of using point
codes^H^H^H^H^H^H^H^H^H^H^HIP addresses.
...
There are similarities between the 'Service Providers are
destroying SIP' argument and the 'NATs are destroying the
end-to-end Internet' arguments popular in the IETF during the
1990's. NATs were (and are) deployed because they met a need.
The abuse of SIP is being done to meet a need -- it is not being
done to upset the digerati.
I don't think the situations are fully comparable. I understand the
problems NATs were introduced to solve. You'd have a hard time finding
anyone in the IETF who doesn't operate at least one NAT of their own.
It's a sad little secret that we hate them from a protocol design
perspective, but embrace them for our day-to-day tasks.
Stupid security, on the other hand, isn't something you'll find anyone
who knows the first thing about computers doing. No one uses stock FTP
or telnet for real tasks any more -- it's all scp and ssh. But ITSPs
don't deploy SIP over TLS for reasons I can't fathom. Anyone who knows
the first thing about IP networks recognizes that it is laughable to
authenticate based on source IP address. And yet ITSPs insist on doing
so. The most popular application on the internet has a well-exercised,
certificate-based, crypto-secure means of determining the identity of a
server (TLS). SIP, from its inception, has been able to leverage this
exact mechanism at least for authentication of servers and for
confidentiality of signaling. ITSPs aren't deploying it.
The problem isn't a lack of available solutions for these kinds of
problems -- it's the fact the ITSPs are employing the same kind of
moronic "security" that gave rise to blue-boxing in the 1970s. I don't
claim that it's being done to upset us; the reasons aren't exactly
clear. They could be ignorance. The could be intransigence. They could
be plain stupidity. But there's something there that's preventing the
adoption of any real IETF-defined security by ITSPs.
Given that as a backdrop, I don't see how our defining Yet Another
Security Mechanism is going to make one whit of difference. ITSPs aren't
deploying the stuff we've already done, even the stuff that is
completely ready for prime time and doesn't get in the way of any
business needs. How will this effort be different?
/a
_______________________________________________
Sip mailing list https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip